host

(redirected from compromised host)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia.
Related to compromised host: phytosis, cephalocaudal axis, malacic

host

(Multitude), noun a many, a mass of, an abundance of, army, array, assembly, body, cloud, cluster, company, congregation, crowd, crush, flood, galaxy, group, herd, horde, jam, large amount, litter, nest, no end of, numbers, pack, panoply, school, scores, slew, storm

host

(Owner), noun barkeeper, bartender, hostess, hotel keeper, innkeeper, inviter, owner, owner of an estabbishment, proprietor, restaurant owner, saloon keeper, serving liquor, tavern keeper
Associated concepts: host liability statute
See also: body, collection, mass, plurality, quantity
References in periodicals archive ?
2 Immuno compromised hosts with conditions like diabetes mellitus HIV infec- tions immuno-suppressive and bisphosphonate drugs; radiotherapy and malnutrition are possible candidates of osteomyelitis after jaw surgery in these patients.
The fact that these URLs are valid Web servers, it means that the compromised host scans possible targets directly from the beginning of the scanning phase.
aeruginosa in healthy hosts with those in compromised hosts.
Any compromised host in the trust domain is identified by running n instances (n is the max number of hosts in the trust domain) of the Signed_ Message algorithm in parallel, assuming that the majority of the hosts in the trust domain are not compromised.
The scientific sessions of the conference itself will be focussed on Endemic Infections in Pakistan; Vaccinology; Infections in the Hospital; Emerging Infections; Infections in Urology; Tuberculosis; Infections in Developing Countries; Infection in the Immuno Compromised Host, etc.
Jay Fishman, MD, president of the American Society of Transplantation and director of the Transplant Infectious Disease & Compromised Host Program at Massachusetts General Hospital in Boston, issued a report immediately following news of the rabies transmission associated with organs donated by an infected donor.
In this approach, the administrator who suspects a compromised host can create new hash values and compare the new hash values to a set of "known good" values.
One common practice is to unplug the compromised host until the intruder leaves and then plug it back in--just as insecure as before.
The integration provides users with the following capabilities: if the Sourcefire IPS detects a potentially malicious or compromised host inside the network, it can alert Bradford NAC Director or Campus Manager to quarantine that host; and if a host violates a Sourcefire compliance rule or white list, Bradford NAC Director or Campus Manager can quarantine that host.
The chapter on immunication does not cover immunization in the compromised host.
As a result, penetration testers can run any network discovery tool, such as the NeXpose vulnerability scanner, through a compromised host as if they were directly connected to the internal network.